2019
DOI: 10.1109/tsg.2018.2813280
|View full text |Cite
|
Sign up to set email alerts
|

False Data Injection Attacks Against State Estimation in Power Distribution Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
86
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 175 publications
(86 citation statements)
references
References 29 publications
0
86
0
Order By: Relevance
“…Concepts such as Micro-Grid (MG), Smart Grid (SG) and Smart Island (SI) in AC and DC power systems with advances in digital communication technologies have received more attention in the past few years. Recently, several researchers and studies have highlighted the vulnerability of traditional AC and DC state estimators to the FDIAs in that an adversary is able to present manipulated measurements to the mislead operation systems [11]. Some kind of attacks are able to bypass common Bad Data Detection (BDD) in the State Estimation (SE) as the measurement remnants with FDIAs are the same as the measurement residuals with no FDIAs.…”
Section: A Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Concepts such as Micro-Grid (MG), Smart Grid (SG) and Smart Island (SI) in AC and DC power systems with advances in digital communication technologies have received more attention in the past few years. Recently, several researchers and studies have highlighted the vulnerability of traditional AC and DC state estimators to the FDIAs in that an adversary is able to present manipulated measurements to the mislead operation systems [11]. Some kind of attacks are able to bypass common Bad Data Detection (BDD) in the State Estimation (SE) as the measurement remnants with FDIAs are the same as the measurement residuals with no FDIAs.…”
Section: A Backgroundmentioning
confidence: 99%
“…By assuming that the change vector of the SV x is determined as c, the residuals of the system measurement before and after the attack would be and . In general, natural measurements z can cross the LNR-based BDD module, by calculating the 2 − of the residual measurement in order to detect bad measurements, we can define equation (11):…”
Section: Main Construction Of Ac-fdiasmentioning
confidence: 99%
“…The malicious measurement za could bypass the BDD detector and not lead to a change in the residual value under the condition a = h( x + c) − h( x), where c = [c 1 , · · · , cn] is the maliciously injected error on the system state [19]. After false data injection, distribution system state estimation will get an erroneous system state [16]:…”
Section: Problem Formulationmentioning
confidence: 99%
“…However, the integrity of state estimation is under mounting threat, and they are vulnerable to cyber-attacks specifically false data injection attacks [7]. Deng et al [16] extend FDI attacks against state estimation in transmission systems to distribution feeders. These attacks can cause severe damages to the distribution systems.…”
Section: Introductionmentioning
confidence: 99%
“…Following the local attack scheme in [28], Deng et al in [52] proposed an attack model against distribution system state estimation. Specifically, the authors discussed the strategy to avoid having the complete knowledge of the network topology and related parameters.…”
Section: Other Local Attack Modelsmentioning
confidence: 99%